Suspecioyus Activity
Suspecioyus Activity
Suspecioyus Activity
Suspecius Activity
Engineering) BY
CERTIFICATE
Detection Submitted by
is a bonafide work carried out by Students under the supervision of Prof. Guide
Name and it is submitted towards the partial fulfillment of the requirement of
Bach- elor of Engineering (Computer Engineering) Project.
I would like to take this opportunity to thank my internal guide Prof. Guide Name
for giving me all the help and guidance I needed. I am really grateful to them for
their kind support. Their valuable suggestions were very helpful.
In the end our special thanks to Other Person Name for providing various
resources such as laboratory with all needed software platforms, continuous
Internet connec- tion, for Our Project.
Student Name1
Student Name2
Student Name3
Student Name4
(B.E. Computer Engg.)
1 Introduction 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 Need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.3 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 Literature Survey 4
2.1 Study Of Research Paper . . . . . . . . . . . . . . . . . . . . . . . 5
3 Problem Statement 14
4 Project Requirement 16
4.1 EXTERNAL INTERFACE REQUIREMENT........................................17
4.1.1 User Interface..............................................................................17
4.1.2 Hardware Interfaces:....................................................................17
4.1.3 Software Interfaces......................................................................17
4.2 NON FUNCTIONAL REQUIREMENT.................................................18
4.2.1 Performance Requirements..........................................................18
4.2.2 Safety Requirement.....................................................................18
4.2.3 Software Quality Attributes.........................................................18
5 System Analysis 20
5.1 System Architecture.................................................................................21
5.1.1 Module.........................................................................................21
5.1.2 Data Flow Diagram.....................................................................21
6 Software Information 27
7 Project Plan 30
7.1 Stakeholder List . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7.2 System Implementation Plan . . . . . . . . . . . . . . . . . . . . . 31
8 Conclusion 33
8.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
9 References 34
INTRODUCTION
1.1 OVERVIEW
1.1.1 Motivation
1.1.2 Need
• An crucial instrument in the battle against financial crimes like money launder-
ing is a suspicious activity report (SAR). All financial institutions are
advised to create a system for detecting and reporting suspicious activity by
the Finan- cial Action Task Force (FATF), a worldwide AML watchdog.
1.1.3 Objective
LITERATURE
SURVEY
2.1 STUDY OF RESEARCH PAPER
PROBLEM STATEMENT
1. suspecious Activity is predicting the body part or joint locations of a person
from an image or a video. This project will entail detecting suspecious
human Activity from real-time CCTV footage using neural networks.
PROJECT REQUIREMENT
4.1 EXTERNAL INTERFACE REQUIREMENT
• RAM : 8GB
• HardDisk : 40 GB
• IDE: Annaconda
• The performance of the functions and every module must be well. The
overall performance of the software will enable the users to work decently.
Perfor- mance of encryption of data should be fast. Performance of the
providing virtual environment should be fast Safety Requirement
• Our software has many quality attribute that are given below:-
• Maintainability: After the deployment of the project if any error occurs then
it can be easily maintained by the software developer.
• User Friendliness: Since, the software is a GUI application; the output gener-
ated is much user friendly in its behavior.
SYSTEM ANALYSIS
5.1 SYSTEM ARCHITECTURE
Hardware Component
Raspberry Pi :
Raspberry Pi is defined as a minicomputer the size of a credit card that is interoperable with any
input and output hardware device like a monitor, a television, a mouse, or a keyboard – effectively
converting the set-up into a full-fledged PC at a low cost
Diagram
o Operating System
• The Broadcom BCM2835 SoC used in the first generation Raspberry Pi is somewhat equivalent to the
chip used in first modern generation smartphones (its CPU is an older ARMv6 architecture), which
includes a 700 MHz ARM1176JZF-S processor, VideoCore IV graphics processing unit (GPU), and
RAM.
• It has a level 1 (L1) cache of 16 KB and a level 2 (L2) cache of 128 KB. The level 2 cache is used
primarily by the GPU. The SoC is stacked underneath the RAM chip, so only its edge is visible.
• The Raspberry Pi 2 uses a Broadcom BCM2836 SoC with a 900 MHz 32-bit quad-core ARM Cortex-A7
processor, with 256 KB shared L2 cache.
• The Raspberry Pi 3 uses a Broadcom BCM2837 SoC with a 1.2 GHz 64-bit quad-core ARM Cortex-
A53 processor, with 512 KB shared L2 cache
o Performance
• The Raspberry Pi 3, with a quad-core Cortex-A53 processor, is described as 10 times the performance of
a Raspberry Pi . This was suggested to be highly dependent upon task threading and instruction set use.
Benchmarks showed the Raspberry Pi 3 to be approximately 80% faster than the Raspberry Pi 2 in
parallelized tasks.
• Raspberry Pi 2 includes a quad-core Cortex-A7 CPU running at 900 MHz and 1 GB RAM. It is
described as 4–6 times more powerful than its predecessor. The GPU is identical to the original. In
parallelized benchmarks, the Raspberry Pi 2 could be up to 14 times faster than a Raspberry Pi 1 Model
B+.
o RAM
• The Model A, A+ and Pi Zero have no Ethernet circuitry and are commonly connected to a network
using an external user-supplied USB Ethernet or Wi-Fi adapter.
• On the Model B and B+ the Ethernet port is provided by a built-in USB Ethernet adapter using the
SMSC LAN9514 chip.
• The Raspberry Pi 3 and Pi Zero W (wireless) are equipped with 2.4 GHz WiFi 802.11n (150 Mbit/s) and
Bluetooth 4.1 (24 Mbit/s) based on Broadcom BCM43438 Full MAC chip with no official support for
Monitor mode but implemented through unofficial firmware patching and the Pi 3 also has a 10/100
Ethernet port.
Peripherals
• The Raspberry Pi may be operated with any generic USB computer keyboard and mouse.
• It may also be used with USB storage, USB to MIDI converters, and virtually any other
device/component with USB capabilities.
• Other peripherals can be attached through the various pins and connectors on the surface of the
Raspberry Pi.
Video Capabilities
• The video controller can emit standard modern TV resolutions, such as HD and Full HD, and higher or
College Short Form Name, Department of Computer Engineering 24
2021
lower monitor resolutions and older standard CRT TV resolutions.
Uses of Raspberry Pi
1. Constructing a desktop PC
2. Enabling media usage
3. Controlling IoT robots
4. Acting as a printer server
5. Replacing web servers
Buzzer
Description:-
The Passive Buzzer Module KY-006 is a type of piezoelectric alarm sensor commonly used in DIY
electronics and robotics projects. It is a compact, self-contained module that generates an audible tone
when a voltage is applied to its input.
The KY-006 has a piezoelectric ceramic disc inside which vibrates when a voltage is applied, generating a
sound. It is passive, meaning that it does not have its own internal oscillator and must be driven by an
external signal.
The module has two pins, one for connecting to a positive voltage (VCC) and one for connecting to
ground (GND). When a square wave signal is applied to the input, the piezoelectric ceramic disc vibrates
at the frequency of the square wave, producing a sound.
The KY-006 is a small and simple module that can be easily integrated into a variety of projects and
devices. It can be used as a simple alarm, as a signal generator, or as a component in more complex audio
systems
There are two types of piezoelectric buzzers that are commonly used in electronics projects – active
buzzers and passive buzzers. Active buzzers are called active because they only need a DC voltage to
produce sound. Passive buzzers need an AC voltage to produce sound
Structural principle buzzer
(A) the introduction of the buzzer
1. The role of the buzzer: buzzer is an integrated structure of electronic transducers, DC power supply,
widely used in computers, printers, copiers, alarms, electronic toys, automotive electronic equipment,
telephones, timers, etc. electronic products for sound devices.
2. Buzzer Category: mainly divided into piezoelectric buzzer and two types of electromagnetic buzzer.
3. Buzzer circuit pattern symbols: the buzzer in the circuit by the letter "H" or "HA" (old standard with
"FM", "LB", "JD", etc.) indicates.
Schematic buzzer
(Two) structural principle buzzer
1. Piezo Buzzer: piezoelectric buzzer mainly by the multivibrator, piezo buzzer, impedance matching and
resonance box, casing and other components. Some piezo buzzer case is also equipped with light-emitting
diodes.
Multivibrator constituted by the transistors or integrated circuits. When switched on (1.5V-15V DC
working voltage), multi-harmonic oscillator start-up, the output 1.5-2.5kHZ audio signal, impedance
matching push piezo buzzer sound.
Piezo buzzer by a lead zirconate titanate or lead magnesium niobate piezoelectric ceramic material. Both
surfaces of the ceramic sheet plated silver electrode, the polarization and the aging treatment, and then
with brass or stainless steel sheet stick together.
2. Magnetic Buzzer: electromagnetic buzzer by the oscillator, the electromagnetic coil, magnet,
diaphragm and housing and other components.
Diagram:-
Working:-
The KY-006 passive buzzer module is a piezoelectric alarm sensor that generates a tone when a voltage is
applied to it. It works by converting electrical energy into mechanical energy through the use of a
piezoelectric material, which vibrates at a specific frequency when voltage is applied. The module
produces an audible sound or tone, which can be used for alarms, signals, or notifications. To use the KY-
006 module, it needs to be connected to a microcontroller or a control circuit that can provide the
necessary voltage and control the frequency of the sound.
Specifications:-
Operating Voltage: DC 5V
Operating Current: 15mA
Operating Frequency: 2.048 kHz
Sound Pressure Level (SPL): 65±5 dB
Connector: 3-pin interface
Dimensions: 22mm x 15mm x 10mm
Applications:-
Alarms: It can be used as a simple alarm sound generator, triggered by a microcontroller or a control
circuit.
Signaling: It can be used to provide audio feedback in response to user actions, such as button presses or
other events.
Notifications: It can be used to provide audio notifications, such as incoming message or call alerts in a
project.
Musical instrument: It can be used in a musical instrument to generate simple tones or beeps.
Educational projects: It can be used in educational projects to demonstrate the principles of
piezoelectricity and sound generation.
Type of sensor:-
The KY-006 Passive Buzzer Module is a type of piezoelectric alarm sensor. A piezoelectric sensor is a
device that converts electrical energy into mechanical energy and vice versa. In the case of the KY-006, it
uses a piezoelectric material to generate a sound or tone when a voltage is applied to it. The buzzer is
referred to as "passive" because it doesn't have an internal oscillator, and it requires an external signal to
generate the sound. This is in contrast to "active" buzzers, which have an internal oscillator and can
generate sound on their own.
5.1.1 Module
• Pre-processing
• Feature Extraction
• Classification
In Data Flow Diagram,we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system,In DFD1 we show actual input and actual output of system input of our
College Short Form Name, Department of Computer Engineering 27
2021
system is text or image and output is rumor detected like wise in DFD 2 we present
operation of user as well as admin.
Component Diagram.
Sequence Diagram.
SOFTWARE INFORMATION
Annaconda: What is Anaconda Navigator? Anaconda Navigator is a desktop
graphical user interface (GUI) included in Anaconda® distribution that allows you
to launch applications and easily manage conda packages, environments, and chan-
nels without using command-line commands. Navigator can search for packages
on Anaconda.org or in a local Anaconda Repository. It is available for Windows,
macOS, and Linux. To get Navigator, get the Navigator Cheat Sheet and install
Anaconda.
The Getting started with Navigator section shows how to start Navigator
from the shortcuts or from a terminal window.
What applications can I access using Navigator?
The following applications are available by default in Navigator:
1. JupyterLab
2. Jupyter Notebook
3. Spyder
4. PyCharm
5. VSCode
6. Glueviz
7. Orange 3 App
8. RStudio
PROJECT PLAN
In this chapter we are going to have an overview about how much time does it took
to complete each task like- Preliminray Survey Introduction and Problem
Statement, Literature Survey, Project Statement, Software Requirement and
Specification, Sys- tem Design, Partial Report Submission, Architecture Design,
Implementation, De- ployment, Testing, Paper Publish, Report Submission and
etcetera. This chapter also gives focus on stakeholder list which gives information
about project type, customer of the proposed system, user and project member who
developed the system.
The System Implementation plan table, shows the overall schedule of tasks compi-
lation and time duration required for each task.
Sr. No. Name/Title Start Date End Date
1 Preliminary Survey
2 Introduction and Problem State-
ment
3 Literature Survey
4 Project Statement
5 Software Requirement And Specifi-
cation
6 System Design
7 Partial Report Submission
8 Architecture Design
9 Implementation
10 Deployement
11 Testing
12 Paper Publish
13 Report Submission
Chapter 8
Conclusion
8.1 CONCLUSION
A system to process real-time CCTV footage to detect any suspecious activity will
help to create better security and less human intervention.Great strides have been
made in the field of human suspecious Activity, which enables us to better serve
the myriad applications that are possible with it. Moreover, research in related
fields such as Activity Tracking can greatly enhance its productive utilization in
several fields.
Chapter 9
References
3 Qiuhui Chen, Chongyang Zhang, Weiwei Liu, and Dan Wang, ”Surveillance
Human Pose Dataset And Performance Evaluation For Coarse-Grained Pose
Estimation”, Athens 2018.
4 Baole Ai, Yu Zhou, Yao Yu : “Human Pose Estimation using Deep Structure
Guided Learning”- 978-1-5090-4822-9/17 2017 IEEE DOI 10.1109/WACV.2017.141
5 Zhe Cao, Tomas Simon, Shih-En Wei, Yaser Sheikh The Robotics Institute,
Carnegie Mellon University ”Real time Multiperson 2D Pose Estimation
using
part affinity fields” - 1063-6919/17 2017 IEEE DOI 10.1109/CVPR.2017.143
6 Hanguen Kim, Sangwon Lee, Dongsung Lee, Soonmin Choi, JinsunJu and
Huyun Myung “Real-Time Human Pose Estimation and Gesture Recognition
from depth Images Using Superpixels and SVM classifier.”- Sensors 2015,
15, 12410-12427; doi:10.3390/s150612410
9 S. Wang, Z. Su, L. Ying, X. Peng, S. Zhu, F. Liang, D. Feng, and D. Liang. Ac-
celerating magnetic resonance imaging via deep learning. In Proceedings of
the IEEE International Symposium on Biomedical Imaging, pages 514–517,
2016.
10 L. Xu, J. Ren, C. Liu, and J. Jia. Deep convolutional neural network for
image deconvolution. In Advances in Neural Information Processing
Systems, pages 1790–1798, 2014.
11 Y. Yang, J. Sun, H. Li, and Z. Xu. Deep ADMM-Net for compressive sensing
MRI. In Advances in Neural Information Processing Systems, pages 10–18,
2016.
12 Z. Zhan, J.-F. Cai, D. Guo, Y. Liu, Z. Chen, and X. Qu. Fast multiclass dic-
tionaries learning with geometrical directions in MRI reconstruction. IEEE
Transactions on Biomedical Engineering, 63(9):1850– 1861, 2016.